Behavioral task
behavioral1
Sample
a774be49a50d0289a4d51679c1b75f736e8128c65451fcde9dc44812b9bf594e.exe
Resource
win7-20240705-en
General
-
Target
a774be49a50d0289a4d51679c1b75f736e8128c65451fcde9dc44812b9bf594e
-
Size
75KB
-
MD5
2435ef2414fcf616da97999a95ec4bd8
-
SHA1
e2429b1a2b0aca9340a97d80d5ad7a311467f161
-
SHA256
a774be49a50d0289a4d51679c1b75f736e8128c65451fcde9dc44812b9bf594e
-
SHA512
99a606205c9ee2a1b2095df27afb53a3a392eba43e525bd6abc1fedeffb3e64eca1608c478b1fbfd1d75f7a65a1ec201edac8c9be4845fbb7dec348613898c25
-
SSDEEP
1536:0ukULWEVCuPPMRkUKt2OlY6H1bf/i/f7kzkuLVclN:0XUyWHPMRkUv4jH1bfMf7k/BY
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
94.156.66.48:4449
Antivirus
-
delay
1
-
install
true
-
install_file
Antivirus.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule sample family_asyncrat -
Asyncrat family
-
resource yara_rule sample VenomRAT -
Venomrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a774be49a50d0289a4d51679c1b75f736e8128c65451fcde9dc44812b9bf594e
Files
-
a774be49a50d0289a4d51679c1b75f736e8128c65451fcde9dc44812b9bf594e.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ